First published: Wed Mar 31 2010(Updated: )
Apache CouchDB upstream has released latest, v0.11.0 version, addressing timing attack flaw(s). More from Bugtraq post: [1] <a href="http://seclists.org/bugtraq/2010/Mar/254">http://seclists.org/bugtraq/2010/Mar/254</a> "Apache CouchDB versions prior to version 0.11.0 are vulnerable to timing attacks, also known as side-channel information leakage, due to using simple break-on-inequality string comparisons when verifying hashes and passwords." References: [2] <a href="http://wiki.apache.org/couchdb/Breaking_changes">http://wiki.apache.org/couchdb/Breaking_changes</a> [3] <a href="http://codahale.com/a-lesson-in-timing-attacks/">http://codahale.com/a-lesson-in-timing-attacks/</a> [4] <a href="http://couchdb.apache.org/">http://couchdb.apache.org/</a> [5] <a href="http://couchdb.apache.org/downloads.html">http://couchdb.apache.org/downloads.html</a> Credit: Jason Davies of the Apache CouchDB development team CVE Request for Apache CouchDB v0.11.0: [6] <a href="http://www.openwall.com/lists/oss-security/2010/03/31/5">http://www.openwall.com/lists/oss-security/2010/03/31/5</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CouchDB | <0.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-578572 is considered high due to the vulnerability to timing attacks in Apache CouchDB.
To fix REDHAT-BUG-578572, upgrade Apache CouchDB to version 0.11.0 or later.
Apache CouchDB versions prior to 0.11.0 are affected by REDHAT-BUG-578572.
Yes, REDHAT-BUG-578572 can potentially lead to data breaches through timing attack exploits.
There are no known workarounds for REDHAT-BUG-578572; updating to the fixed version is necessary.